Sei sulla pagina 1di 3

A firewall is used in a system connected to a wide area network to

-hacker

Why is there a need to control in information system?

Information system stores large volume of data.

By auditing around the computer we mean

d. the programs and procedures are checked for correctness

This is concerned with protecting data from erasure, theft, unauthorized access and
unauthorized modifications.

data security

A type of testing wherein incorrect inputs, incorrect processing and incorrect


outputs will be detected during operation.

system testing

This is concerned with protecting data regarding individuals from being accessed
and used without the permission/knowledge of concerned individuals.

data privacy

This is processing control that is use to check intermediate results in long and
complex calculations.

check points

Which of the following is an objective of control?

all *

This is concerned with the quality and reliability of raw as well as processed
data.

data integrity

Organizational measures in control mean

. a set of well organized methods*

Aldrin want to conduct a testing of the developed information system together with
the manual system using live data. What kind of testing Aldrin will conduct?

parallel

Aldrin want to conduct a testing of the developed information system together with
the manual system using data used from manual system to test system when it is
first implemented. What kind of testing Aldrin will conduct?

pilot

Aldrin is the Systems Analyst of the company. As a System Analyst, he need to


ensure logs are kept, who did in critical data entry and processing. What does
Aldrin need to implement?
audit *

Ronnie want to protect his data when sending from the main office to the branch
office.
Which of the following information security he will apply?

encryption

Which of the following does NOT considered as potential threats to security of the
Information System?

hacking

Which of the following is a control technique during input preparation?

data entry

Errors are found in an operational information system will result to

redesigning*

Ronnie is the IT Security Officer of the TRA Corporation. His task is to


secure/protect the data and programs of the company. Which of the following action
he will do?

backup *

This is a potential threat wherein an interruption in an authorized user's access


to a computer network.

denial

Electronic Data Interchange is necessary in

a. Commerce using internet

2&4 **

This is a security device deployed at the boundary of an organization's network to


protect it from unauthorized external access.

firewall

Aldrin is the network engineer of the TRA Corporation. TRA Corporation has offices
in Cebu, Iloilo and in Davao. As a network engineer, he need to connect the LAN of
different offices to the main office in Makati City.

router *

Use ___________________ to attach EDI forms to e-mail messages

MIME

After encryption, a transformed data is also known as


CIPHER
EDIFACT standard was developed by

c. United Nations Economic Commission for Europe

Ronnie want to protect his data when sending from the main office to the branch
office.
Which of the following information security he will apply?

encryption

Two corporate intranets may be interconnected using a leased line from PSTN -such a
network is called __________

LAN*

The process of unscrambling the message is called

decrpytion

In the E commerce, a customer sends an order over the internet.

To secure the order,

encrypted

Information System is being tested as a whole system. What kind of testing is being
conducted?

full

This is a computer-to-computer exchange of business documents in a standard


electronic format between business partners

EDI

When sending data from the source to destination, the message is ____________.

BROKEN INTO PACKETS

In ER Model, a relationship is represented by a

diamond

Potrebbero piacerti anche